Sciweavers

5575 search results - page 960 / 1115
» Information Extraction
Sort
View
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
15 years 8 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
DAC
2007
ACM
15 years 8 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
ICPR
2010
IEEE
15 years 8 months ago
Improving Undersampled MRI Reconstruction Using Non-Local Means
Obtaining high quality images in MR is desirable not only for accurate visual assessment but also for automatic processing to extract clinically relevant parameters. Filtering-bas...
Ganesh Adluru, Tolga Tasdizen, Ross Whitaker, Edwa...
ICDCS
2010
IEEE
15 years 8 months ago
Visual, Log-Based Causal Tracing for Performance Debugging of MapReduce Systems
Abstract—The distributed nature and large scale of MapReduce programs and systems poses two challenges in using existing profiling and debugging tools to understand MapReduce pr...
Jiaqi Tan, Soila Kavulya, Rajeev Gandhi, Priya Nar...
HRI
2007
ACM
15 years 8 months ago
A dancing robot for rhythmic social interaction
This paper describes a robotic system that uses dance as a form of social interaction to explore the properties and importance of rhythmic movement in general social interaction. ...
Marek P. Michalowski, Selma Sabanovic, Hideki Kozi...